Security and Data Protection Requirements Sample Clauses

Security and Data Protection Requirements. 12.1 Cisco and its affiliates, representatives, agents, employees, and subcontractors shall only access Your and Your Approved Source’s and the Authorized Third PartiesCustomer Content, networks, and systems when such access is necessary to provide or otherwise deliver Cisco Technology and services contemplated herein.
AutoNDA by SimpleDocs
Security and Data Protection Requirements. The State must ensure Agreements with State and non-state entities include provisions which protect and minimize risk to the State when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit D, Security and Data Protection.
Security and Data Protection Requirements. The EDD must ensure agreements with state and non-state entities include provisions, which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit E, Security and Data Protection. EXHIBIT A-1 ACCEPTANCE DOCUMENT CONTRACTOR NAME: EMPLOYMENT DEVELOPMENT DEPARTMENT CONTRACT NUMBER: ACCEPTANCE DOCUMENT (AD) NUMBER: TITLE: COMPLETION DATE: TOTAL COST: $ DESCRIPTION: EMPLOYMENT DEVELOPMENT DEPARTMENT ACCEPTANCE OR REJECTION: AUTHORIZED AND APPROVED: CONTRACTOR OFFICIAL SIGNATURE / DATE EMPLOYMENT DEVELOPMENT DEPARTMENT CONTRACT ADMINISTRATOR SIGNATURE / DATE Note: Once the Contractor and the Employment Development Department have approved the AD as stipulated in the contract, the Contractor may submit an invoice to the Employment Development Department. Refer to payment terms in Exhibit B. WORK AUTHORIZATION FORM The task/deliverable(s) will be performed in accordance with this Work Authorization and the provision of Contract Number: WORK AUTHORIZATION NUMBER PAGE(S) TITLE OF TASK/DELIVERABLE TASK/DELIVERABLE SUMMARY (Brief description of task/deliverable to be performed under work authorization) START DATE COMPLETION DATE TOTAL ESTIMATED LABOR HOURS TOTAL ESTIMATED COST APPROVALS CONTRACTOR CONTRACT ADMINISTRATOR NAME TITLE SIGNATURE DATE EMPLOYMENT DEVELOPMENT DEPARTMENT CONTRACT TITLE ADMINISTRATOR NAME SIGNATURE DATE WORK AUTHORIZATIONS (WA)‌
Security and Data Protection Requirements. The EDD must ensure agreements with state and non-state entities include provisions, which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In accordance with the State Administrative Manual (XXX) Section 5305.8, Exhibit E, Security and Data Protection, California Government Code Section 1044 and Internal Revenue Service Publication 1075, Section 5.1.1, contracted employees who have access to federal tax information (FTI) are required to comply with security requirements as specified under federal and state law. All currently existing and new contracted employees with access to FTI, will be required to complete and successfully pass a background check. Access to FTI would include, but not be limited to the following access modes: • ACES • SCDB • TOP • IRS TIN verification website • Remote access to computers with FTI • Server data files with FTI • Audit documents with FTI data • Form 1099Official Personnel Files that include adverse actions with FTI data • Access to Central Office buildings • Access to areas with FT EXHIBIT B (Standard Agreement) EDD Contract No. M62980-7100 Am. 1 EDD/Maximus US Services, Inc. BUDGET DETAIL AND PAYMENT PROVISIONS
Security and Data Protection Requirements. The Cal OES must ensure agreements with state and non-state entities include provisions which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with the EXHIBIT D: CLOUD COMPUTING SERVICES SOFTWARE AS A SERVICE (SAAS) SPECIAL PROVISIONS - TELECOMMUNICATIONS (Rev. 05/03/2021) requirements. The host Cloud provider must provide FedRAMP High Certification, plus, meet the additional requirements found in XXX and CA Statewide Information Management Manual (SIMM).‌

Related to Security and Data Protection Requirements

  • Data Protection Act 7.1.1 The Supplier shall (and shall procure that its entire Staff) comply with any notification requirements under the DPA and both Parties will duly observe all their obligations under the DPA which arise in connection with the Contract.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data, Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less stringent than the safeguards used by County. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information and cyber security program prior to commencement of Services and from time to time during the term of this Contract. All data belongs to the County and shall be destroyed or returned at the end of the contract via digital wiping, degaussing, or physical shredding as directed by County.

  • Data Protection Laws those laws applicable to the processing of personal data in the relevant jurisdictions, including but not limited to the General Data Protection Regulation 2016/679.

Time is Money Join Law Insider Premium to draft better contracts faster.